Journal of Applied Mathematics / 2014 / Article / Tab 2

Research Article

Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

Table 2

Application protocol attacks.

Attack typeAttacks

Application scanModbus version scanner
PLC Modbus mode identification
PLC IO scan status
Report slave ID
Function code scan

Improper command executionForce listen only mode
Read/write request to a PLC
Slave device busy exception code delay
Acknowledge exception code delay
Broadcast request from a client

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.